X-Git-Url: http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?a=blobdiff_plain;f=src%2Flabel.c;h=b7bb03322fbc49693d8d7069a66ba523833ec862;hb=6c7506dca32f8add56cd03bf263f417305de74a0;hp=809b1ee64656fb5a75c590a73ee16c44551f28b5;hpb=d2dfce17b5a1bb658e54a0339320207da92dc955;p=elogind.git diff --git a/src/label.c b/src/label.c index 809b1ee64..b7bb03322 100644 --- a/src/label.c +++ b/src/label.c @@ -22,6 +22,7 @@ #include #include #include +#include #include "label.h" #include "util.h" @@ -47,22 +48,43 @@ int label_init(void) { int r = 0; #ifdef HAVE_SELINUX + usec_t n; + struct mallinfo before; if (!use_selinux()) return 0; + if (label_hnd) + return 0; + + before = mallinfo(); + n = now(CLOCK_MONOTONIC); + label_hnd = selabel_open(SELABEL_CTX_FILE, NULL, 0); if (!label_hnd) { log_full(security_getenforce() == 1 ? LOG_ERR : LOG_DEBUG, "Failed to initialize SELinux context: %m"); r = security_getenforce() == 1 ? -errno : 0; + } else { + char buf[FORMAT_TIMESPAN_MAX]; + struct mallinfo after; + int l; + + n = now(CLOCK_MONOTONIC) - n; + after = mallinfo(); + + l = after.uordblks > before.uordblks ? after.uordblks - before.uordblks : 0; + + log_info("Successfully loaded SELinux database in %s, size on heap is %iK.", + format_timespan(buf, sizeof(buf), n), + l/1024); } #endif return r; } -int label_fix(const char *path) { +int label_fix(const char *path, bool ignore_enoent) { int r = 0; #ifdef HAVE_SELINUX @@ -91,6 +113,10 @@ int label_fix(const char *path) { } if (r < 0) { + /* Ignore ENOENT in some cases */ + if (ignore_enoent && errno == ENOENT) + return 0; + log_full(security_getenforce() == 1 ? LOG_ERR : LOG_DEBUG, "Unable to fix label of %s: %m", path); r = security_getenforce() == 1 ? -errno : 0; @@ -170,6 +196,31 @@ int label_fifofile_set(const char *path) { return r; } +int label_symlinkfile_set(const char *path) { + int r = 0; + +#ifdef HAVE_SELINUX + security_context_t filecon = NULL; + + if (!use_selinux() || !label_hnd) + return 0; + + if ((r = selabel_lookup_raw(label_hnd, &filecon, path, S_IFLNK)) == 0) { + if ((r = setfscreatecon(filecon)) < 0) { + log_error("Failed to set SELinux file context on %s: %m", path); + r = -errno; + } + + freecon(filecon); + } + + if (r < 0 && security_getenforce() == 0) + r = 0; +#endif + + return r; +} + int label_socket_set(const char *label) { #ifdef HAVE_SELINUX @@ -230,20 +281,15 @@ int label_mkdir( if (use_selinux() && label_hnd) { - if (path[0] == '/') + if (path_is_absolute(path)) r = selabel_lookup_raw(label_hnd, &fcon, path, mode); else { - char *cwd = NULL, *newpath = NULL; - - cwd = get_current_dir_name(); + char *newpath = NULL; - if (cwd || asprintf(&newpath, "%s/%s", cwd, path) < 0) { - free(cwd); - return -errno; - } + if (!(newpath = path_make_absolute_cwd(path))) + return -ENOMEM; r = selabel_lookup_raw(label_hnd, &fcon, newpath, mode); - free(cwd); free(newpath); }